Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
—We study how to characterize the families of paths between any two nodes s, t in a sensor network with holes. Two paths that can be deformed to one another through local changes...
Wei Zeng, Rik Sarkar, Feng Luo 0002, Xianfeng Gu, ...
—In this paper, we extend both Bianchi’s and Kumar’s models and characterize the channel activities governed by IEEE 802.11 DCF in multi-hop wireless networks from the perspe...
— In this paper, we consider the issue of localization in anisotropic sensor networks. Anisotropic networks are differentiated from isotropic networks in that they possess proper...
—Conserving network-wide energy consumption is becoming an increasingly important concern for network operators. In this work, we study network-wide energy conservation problem w...